This is the third instalment in our analysis of an attack, and follows on from “MITRE ATT&CK® – Infiltrating the network”.

"*" indicates required fields

This is the third instalment in our analysis of an attack, and follows on from “MITRE ATT&CK® – Infiltrating the network”. In the previous article, we looked at how an attacker enumerated and discovered credentials, accounts, data and other systems on the network to spread to other targets.

We will now look at the final attack stages – gathering and exfiltrating sensitive data while preventing recovery and then conclude by looking at how an organisation can detect the different attack stages and use the MITRE ATT&CK® recommendations to defend against them.

SIGN UP TO RECEIVE CYBER SECURITY INSIGHTS

Read by directors, executives, and security professionals globally, operating in the most complex of security environments.